Prosecuting Computer Crime Manual Computer Crime and Intellectual Property Section 10Th & Constitution Ave., N.W

Total Page:16

File Type:pdf, Size:1020Kb

Prosecuting Computer Crime Manual Computer Crime and Intellectual Property Section 10Th & Constitution Ave., N.W Prosecuting Computer Crimes H. Marshall Jarrett Computer Crime and Director, EOUSA Intellectual Property Section Criminal Division Michael W. Bailie Director, OLE OLE Litigation Series Ed Hagen Assistant Director, Published by OLE Office of Legal Education Executive Office for Scott Eltringham United States Attorneys Computer Crime and Intellectual Property Section The Office of Legal Education intends that this book Editor in Chief be used by Federal prosecutors for training and law enforcement purposes. The contents of this book provide internal suggestions to Department of Justice attorneys. Nothing in it is intended to create any substantive or procedural rights, privileges, or benefits enforceable in any administrative, civil, or criminal matter by any prospective or actual witnesses or parties. See United States v. Caceres, 440 U.S. 741 (1979). Table of Contents Preface and Acknowledgements .................................................................... v Chapter 1. Computer Fraud and Abuse Act ..........................................1 A. Key Definitions ....................................................................................................... 4 B. Obtaining National Security Information ..........§ 1030(a)(1) ....................12 C.­ Accessing a Computer and Obtaining Information ................................................................§ 1030(a)(2) ....................16 D. Trespassing in a Government Computer ............§ 1030(a)(3) ....................23 E. Accessing to Defraud and Obtain Value .............§ 1030(a)(4) ....................26 F. Damaging a Computer or Information ..............§ 1030(a)(5) ....................35 G. Trafficking in Passwords ..........................................§ 1030(a)(6) ....................49 H. Threatening to Damage a Computer ...................§ 1030(a)(7) ....................52 I. Attempt and Conspiracy .........................................§ 1030(b) .........................55 J. Forfeiture ....................................................................§ 1030(i) & (j) ...............56 Chapter 2. Wiretap Act .................................................................................... 59 A. Intercepting a Communication ............................§ 2511(1)(a) ....................60 B. Disclosing an Intercepted Communication .......§ 2511(1)(c) ....................73 C. Using an Intercepted Communication ...............§ 2511(1)(d) ...................77 D. Statutory Exceptions and Defenses ..................................................................78 E. Statutory Penalties ................................................................................................87 Chapter 3. Other Network Crime Statutes ....................................... 89 A. Unlawful Access to Stored Communications ....§ 2701 ..............................89 B. Identity Theft .............................................................§ 1028(a)(7) ....................96 C. Aggravated Identity Theft .......................................§ 1028A .........................100 D. Access Device Fraud .................................................§ 1029 ............................102 E. CAN-SPAM Act .......................................................§ 1037 ............................105 F. Wire Fraud .................................................................§ 1343 ............................109 G. Communication Interference ................................§ 1362 ............................110 Chapter 4. Special Considerations ......................................................... 113 A. Jurisdiction ...........................................................................................................113 B. Venue .....................................................................................................................115 C. Statute of Limitations ........................................................................................120 D. Juveniles ................................................................................................................121 iii Chapter 5. Sentencing .................................................................................... 131 A. Base Offense Levels ............................................................................................131 B. Adjustments Under Section 2B1.1 .................................................................132 C. CAN-SPAM Act .................................................................................................142 D. Wiretap Act ..........................................................................................................143 E. Generally-Applicable Adjustments .................................................................144 F. Conditions of Supervised Release ...................................................................146 Appendices A. Unlawful Online Conduct and Applicable Federal Laws .........................149 B. Jury Instructions .................................................................................................157 C. Best Practices for Working with Companies ................................................173 D. Best Practices for Victim Response and Reporting ....................................177 E. Network Crime Resources................................................................................185 Table of Authorities ......................................................................................... 189 Index ......................................................................................................................... 201 iv Prosecuting Computer Crimes Preface and Acknowledgements This manual examines the federal laws that relate to computer crimes. Our focus is on those crimes that use or target computer networks, which we interchangeably refer to as “computer crime,” “cybercrime,” and “network crime.” Examples of computer crime include computer intrusions, denial of service attacks, viruses, and worms. We do not attempt to cover issues of state law and do not cover every type of crime related to computers, such as child pornography or phishing. This publication is the second edition of “Prosecuting Computer Crimes” and updates the previous version published in February 2007. During the three years since then, case law developed and, more importantly, Congress significantly amended the Computer Fraud and Abuse Act. Like the first edition of this manual, the revisions contained in this edition of the manual are the result of the efforts and knowledge of many people at CCIPS. Scott Eltringham edited and published it under the supervision of John Lynch and Richard Downing. Substantial assistance was provided by Mysti Degani, Jenny Ellickson, Josh Goldfoot, and Jaikumar Ramaswamy, all of whom took lead responsibility for revising one or more chapters. We are grateful to Ed Hagen and the Office of Legal Education for their assistance in publishing this manual and the prior edition. This manual is intended as assistance, not authority. The research, analysis, and conclusions herein reflect current thinking on difficult and dynamic areas of the law; they do not represent the official position of the Department of Justice or any other agency. This manual has no regulatory effect, confers no rights or remedies, and does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979). Electronic copies of this document are available from our website, www. cybercrime.gov. We may update the electronic version periodically and we advise prosecutors and agents to check the website’s version for the latest developments. CCIPS will honor requests for paper copies only when made by Preface & Acknowledgements v law enforcement officials or by public institutions. Please send such requests to the following address: Attn: Prosecuting Computer Crime manual Computer Crime and Intellectual Property Section 10th & Constitution Ave., N.W. John C. Keeney Bldg., Suite 600 Washington, DC 20530 vi Prosecuting Computer Crimes Chapter 1 Computer Fraud and Abuse Act In the early 1980s law enforcement agencies faced the dawn of the computer age with growing concern about the lack of criminal laws available to fight emerging computer crimes. Although the wire and mail fraud provisions of the federal criminal code were capable of addressing some types of computer- related criminal activity, neither of those statutes provided the full range of tools needed to combat these new crimes. See H.R. Rep. No. 98-894, at 6 (1984), reprinted in 1984 U.S.C.C.A.N. 3689, 3692. In response, Congress included in the Comprehensive Crime Control Act of 1984 provisions to address the unauthorized access and use of computers and computer networks. The legislative history indicates that Congress intended these provisions to provide “a clearer statement of proscribed activity” to “the law enforcement community, those who own and operate computers, as well as those who may be tempted to commit crimes by unauthorized access.” Id. Congress did this by making it a felony to access classified information in a computer without authorization and making it a misdemeanor to access financial records or credit histories stored in a financial institution or to trespass into a government computer. In so doing, Congress opted not to add new provisions regarding computers to existing criminal laws, but rather to address federal computer-related offenses
Recommended publications
  • Charging Language
    1. TABLE OF CONTENTS Abduction ................................................................................................73 By Relative.........................................................................................415-420 See Kidnapping Abuse, Animal ...............................................................................................358-362,365-368 Abuse, Child ................................................................................................74-77 Abuse, Vulnerable Adult ...............................................................................78,79 Accessory After The Fact ..............................................................................38 Adultery ................................................................................................357 Aircraft Explosive............................................................................................455 Alcohol AWOL Machine.................................................................................19,20 Retail/Retail Dealer ............................................................................14-18 Tax ................................................................................................20-21 Intoxicated – Endanger ......................................................................19 Disturbance .......................................................................................19 Drinking – Prohibited Places .............................................................17-20 Minors – Citation Only
    [Show full text]
  • Identity Theft Literature Review
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Identity Theft Literature Review Author(s): Graeme R. Newman, Megan M. McNally Document No.: 210459 Date Received: July 2005 Award Number: 2005-TO-008 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. IDENTITY THEFT LITERATURE REVIEW Prepared for presentation and discussion at the National Institute of Justice Focus Group Meeting to develop a research agenda to identify the most effective avenues of research that will impact on prevention, harm reduction and enforcement January 27-28, 2005 Graeme R. Newman School of Criminal Justice, University at Albany Megan M. McNally School of Criminal Justice, Rutgers University, Newark This project was supported by Contract #2005-TO-008 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S.
    [Show full text]
  • Ransomware Facts and Tips
    RANSOMWARE FACTS & TIPS As technology evolves, the prevalence of ransomware attacks is growing among businesses and consumers alike. It’s important for digital citizens to be vigilant about basic digital hygiene in an increasingly connected world. WHAT IS RANSOMWARE? Ransomware is a type of malware that accesses a victim’s files, locks and encrypts them and then demands the victim to pay a ransom to get them back. Cybercriminals use these attacks to try to get users to click on attachments or links that appear legitimate but actually contain malicious code. Ransomware is like the “digital kidnapping” of valuable data – from personal photos and memories to client information, financial records and intellectual property. Any individual or organization could be a potential ransomware target. WHAT CAN YOU DO? We can all help protect ourselves – and our organizations – against ransomware and other malicious attacks by following these STOP. THINK. CONNECT. tips: • Keep all machines clean: Keep the software on all Internet-connected devices up to date. All critical software, including computer and mobile operating systems, security software and other frequently used programs and apps, should be running the most current versions. • Get two steps ahead: Turn on two-step authentication – also known as two-step verification or multi-factor authentication – on accounts where available. Two-factor authentication can use anything from a text message to your phone to a token to a biometric like your fingerprint to provide enhanced account security. • Back it up: Protect your valuable work, music, photos and other digital information by regularly making an electronic copy and storing it safely.
    [Show full text]
  • Are the Current Computer Crime Laws Sufficient Or Should the Writing of Virus Code Be Prohibited?
    Fordham Intellectual Property, Media and Entertainment Law Journal Volume 18 Volume XVIII Number 3 Volume XVIII Book 3 Article 8 2008 Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited? Robert J. Kroczynski Fordham University School of Law Follow this and additional works at: https://ir.lawnet.fordham.edu/iplj Part of the Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Robert J. Kroczynski, Are the Current Computer Crime Laws Sufficient or Should theriting W of Virus Code Be Prohibited?, 18 Fordham Intell. Prop. Media & Ent. L.J. 817 (2008). Available at: https://ir.lawnet.fordham.edu/iplj/vol18/iss3/8 This Note is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and History. It has been accepted for inclusion in Fordham Intellectual Property, Media and Entertainment Law Journal by an authorized editor of FLASH: The Fordham Law Archive of Scholarship and History. For more information, please contact [email protected]. Are the Current Computer Crime Laws Sufficient or Should theriting W of Virus Code Be Prohibited? Cover Page Footnote Alexander Southwell, Shari Sckolnick This note is available in Fordham Intellectual Property, Media and Entertainment Law Journal: https://ir.lawnet.fordham.edu/iplj/vol18/iss3/8 KROCZYNSKI_022508_FINAL 2/25/2008 7:20:52 PM Are the Current Computer Crime Laws Sufficient or Should the Writing of Virus Code Be Prohibited? Robert J. Kroczynski* INTRODUCTION .............................................................................818 I. BACKGROUND OF CYBERCRIME AND VIRUSES........................820 A. DEFINITION OF VIRUSES AND TECHNICAL DESCRIPTIONS ....822 1.
    [Show full text]
  • The Order of Encryption and Authentication for Protecting Communications (Or: How Secure Is SSL?)?
    The Order of Encryption and Authentication for Protecting Communications (Or: How Secure is SSL?)? Hugo Krawczyk?? Abstract. We study the question of how to generically compose sym- metric encryption and authentication when building \secure channels" for the protection of communications over insecure networks. We show that any secure channels protocol designed to work with any combina- tion of secure encryption (against chosen plaintext attacks) and secure MAC must use the encrypt-then-authenticate method. We demonstrate this by showing that the other common methods of composing encryp- tion and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show an example of an en- cryption function that provides (Shannon's) perfect secrecy but when combined with any MAC function under the authenticate-then-encrypt method yields a totally insecure protocol (for example, ¯nding passwords or credit card numbers transmitted under the protection of such protocol becomes an easy task for an active attacker). The same applies to the encrypt-and-authenticate method used in SSH. On the positive side we show that the authenticate-then-encrypt method is secure if the encryption method in use is either CBC mode (with an underlying secure block cipher) or a stream cipher (that xor the data with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current practical implementations of the protocol that use the above modes of encryption are safe. 1 Introduction The most widespread application of cryptography in the Internet these days is for implementing a secure channel between two end points and then exchanging information over that channel.
    [Show full text]
  • Descriptive Analysis of Georgia High School Teachers' Perceptions of Academic Dishonesty
    Georgia Southern University Digital Commons@Georgia Southern Electronic Theses and Dissertations Graduate Studies, Jack N. Averitt College of Spring 2007 Descriptive Analysis of Georgia High School Teachers' Perceptions of Academic Dishonesty Amy Manning Rowland Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/etd Recommended Citation Rowland, Amy Manning, "Descriptive Analysis of Georgia High School Teachers' Perceptions of Academic Dishonesty" (2007). Electronic Theses and Dissertations. 215. https://digitalcommons.georgiasouthern.edu/etd/215 This dissertation (open access) is brought to you for free and open access by the Graduate Studies, Jack N. Averitt College of at Digital Commons@Georgia Southern. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. A DESCRIPTIVE ANALYSIS OF GEORGIA HIGH SCHOOL TEACHERS’ PERCEPTIONS OF ACADEMIC DISHONESTY by AMY MANNING ROWLAND (Under the Direction of Walter Polka) ABSTRACT This research study was conducted with the assistance of Georgia high school teachers for the purpose of examining teachers’ perceptions of academic dishonesty during the 2006-2007 school year. Data were gathered to establish teachers’ perceptions of academic dishonesty by exploring what behaviors teachers felt to be academically dishonest, how teachers addressed such occurrences, whether teachers felt any internal conflict regarding academic dishonesty, whether any external pressures were involved in instances of academic dishonesty, and how these experiences affected teachers’ attitudes toward their profession. Results of the study indicated that high school teachers in Georgia consider academic dishonesty to be a prevalent problem. Teachers consider some types of academic dishonesty to be more serious than other types of academic dishonesty.
    [Show full text]
  • Opentext Product Security Assurance Program
    The Information Company ™ Product Security Assurance Program Contents Objective 03 Scope 03 Sources 03 Introduction 03 Concept and design 04 Development 05 Testing and quality assurance 07 Maintain and support 09 Partnership and responsibility 10 Privavy and Security Policy 11 Product Security Assurance Program 2/11 Objective The goals of the OpenText Product Security Assurance Program (PSAP) are to help ensure that all products, solutions, and services are designed, developed, and maintained with security in mind, and to provide OpenText customers with the assurance that their important assets and information are protected at all times. This document provides a general, public overview of the key aspects and components of the PSAP program. Scope The scope of the PSAP includes all software solutions designed and developed by OpenText and its subsidiaries. All OpenText employees are responsible to uphold and participate in this program. Sources The source of this overview document is the PSAP Standard Operating Procedure (SOP). This SOP is highly confidential in nature, for internal OpenText consumption only. This overview document represents the aspects that are able to be shared with OpenText customers and partners. Introduction OpenText is committed to the confidentiality, integrity, and availability of its customer information. OpenText believes that the foundation of a highly secure system is that the security is built in to the software from the initial stages of its concept, design, development, deployment, and beyond. In this respect,
    [Show full text]
  • Download the List of History Films and Videos (PDF)
    Video List in Alphabetical Order Department of History # Title of Video Description Producer/Dir Year 532 1984 Who controls the past controls the future Istanb ul Int. 1984 Film 540 12 Years a Slave In 1841, Northup an accomplished, free citizen of New Dolby 2013 York, is kidnapped and sold into slavery. Stripped of his identity and deprived of dignity, Northup is ultimately purchased by ruthless plantation owner Edwin Epps and must find the strength to survive. Approx. 134 mins., color. 460 4 Months, 3 Weeks and Two college roommates have 24 hours to make the IFC Films 2 Days 235 500 Nations Story of America’s original inhabitants; filmed at actual TIG 2004 locations from jungles of Central American to the Productions Canadian Artic. Color; 372 mins. 166 Abraham Lincoln (2 This intimate portrait of Lincoln, using authentic stills of Simitar 1994 tapes) the time, will help in understanding the complexities of our Entertainment 16th President of the United States. (94 min.) 402 Abe Lincoln in Illinois “Handsome, dignified, human and moving. WB 2009 (DVD) 430 Afghan Star This timely and moving film follows the dramatic stories Zeitgest video 2009 of your young finalists—two men and two very brave women—as they hazard everything to become the nation’s favorite performer. By observing the Afghani people’s relationship to their pop culture. Afghan Star is the perfect window into a country’s tenuous, ongoing struggle for modernity. What Americans consider frivolous entertainment is downright revolutionary in this embattled part of the world. Approx. 88 min. Color with English subtitles 369 Africa 4 DVDs This epic series presents Africa through the eyes of its National 2001 Episode 1 Episode people, conveying the diversity and beauty of the land and Geographic 5 the compelling personal stories of the people who shape Episode 2 Episode its future.
    [Show full text]
  • Grand Staircase-Escalante National Monument Antiquates the Antiquities Act
    The Straw that Broke the Camel's Back? Grand Staircase-Escalante National Monument Antiquates the Antiquities Act ERIC C. RUSNAK* The public lands of the United States have always provided the arena in which we Americans have struggled to fulfill our dreams. Even today dreams of wealth, adventure, and escape are still being acted out on these far flung lands. These lands and the dreams-fulfilled and unfulfilled-which they foster are a part of our national destiny. They belong to all Americans. 1 I. INTRODUCTION For some Americans, public lands are majestic territories for exploration, recreation, preservation, or study. Others depend on public lands as a source of income and livelihood. And while a number of Americans lack awareness regarding the opportunities to explore their public lands, all Americans attain benefits from these common properties. Public land affect all Americans. Because of the importance of these lands, heated debates inevitably arise regarding their use or nonuse. The United States Constitution grants to Congress the "[p]ower to dispose of and make all needful Rules and Regulations respecting the... Property belonging to the United States." 2 Accordingly, Congress, the body representing the populace, determines the various uses of our public lands. While the Constitution purportedly bestows upon Congress sole discretion to manage public lands, the congressionally-enacted Antiquities Act conveys some of this power to the president, effectively giving rise to a concurrent power with Congress to govern public lands. On September 18, 1996, President William Jefferson Clinton issued Proclamation 69203 under the expansive powers granted to the president by the Antiquities Act4 ("the Act") establishing, in the State of Utah, the Grand * B.A., Wittenberg University, 2000; J.D., The Ohio State University Moritz College of Law, 2003 (expected).
    [Show full text]
  • SWISS JASS Rules
    SWISS JASS Rules Introduction to the basics Many of the popular play card games in Switzerland, especially in the German speaking cantons, belong to the JASS group, and are played with characteristic Swiss cards, which are known as JASS KARTEN (JASS CARDS). JASS has become so popular in Switzerland that even games which got nothing to do with the JASS group, are sometimes described as kinds of JASS, and the verb “jassen” has come to mean “playing any card game with the Swiss play cards”. Swiss JASS games have a number of basic features in common that will be described on this page to define and clarify their application. These features are: - The rank and values of the cards - The trick-taking rules. The rank and values of the cards A standard JASS pack has 36 cards, containing 4 different “suits” (Schellen, Schilten, Eicheln, Rosen) of 9 cards each. In the non-German speaking cantons, a French suited pack - Coeur (Hearts),Carreau (Diamonds),Pique (Clubs) and Trèfle (Spades ) is used instead of the Swiss suited one, being the cards in each suit : As (Ace), Roi (King), Dame (Queen) , Valet (Jack), Dix (Ten), Neuf (Nine), Huit (Eight), Sept (Seven), and Six (Six). Hearts and diamonds are the red-colored suits, whereas the clubs and spades are black. JASS games are point-trick games. In the simplest version of the game, played without “trumpf”, the rank of the cards in each suit, from highest to lowest, and their values in card points, are as follows: Deutsch (German) English Français (French) Points Ass Ace As 11 König King Roi 4 Ober/Dame Queen Dame 3 Under/Bube Jack Valet 2 Banner/ Zehner Ten Dix 10 Neuner Nine Neuf 0 Achter Eight Huit 0 Siebener Seven Sept 0 Sechser Six Six 0 In addition, whoever wins the last “trick”, gets an extra 5 card points.
    [Show full text]
  • The Boundaries of Vicarious Liability: an Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 1987 The Boundaries of Vicarious Liability: An Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines Alan O. Sykes Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Alan O. Sykes, "The Boundaries of Vicarious Liability: An Economic Analysis of the Scope of Employment Rule and Related Legal Doctrines," 101 Harvard Law Review 563 (1987). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. VOLUME 101 JANUARY 1988 NUMBER 3 HARVARD LAW REVIEW1 ARTICLES THE BOUNDARIES OF VICARIOUS LIABILITY: AN ECONOMIC ANALYSIS OF THE SCOPE OF EMPLOYMENT RULE AND RELATED LEGAL DOCTRINES Alan 0. Sykes* 441TICARIOUS liability" may be defined as the imposition of lia- V bility upon one party for a wrong committed by another party.1 One of its most common forms is the imposition of liability on an employer for the wrong of an employee or agent. The imposition of vicarious liability usually depends in part upon the nature of the activity in which the wrong arises. For example, if an employee (or "servant") commits a tort within the ordinary course of business, the employer (or "master") normally incurs vicarious lia- bility under principles of respondeat superior. If the tort arises outside the "scope of employment," however, the employer does not incur liability, absent special circumstances.
    [Show full text]
  • Hamilton County General Sessions Court - Criminal Division 9/23/2021 Page No: 1 Trial Docket
    CJUS8023 Hamilton County General Sessions Court - Criminal Division 9/23/2021 Page No: 1 Trial Docket Thursday Trial Date: 9/23/2021 8:30:00 AM Docket #: 1825414 Defendant: ANDERSON , QUINTON LAMAR Charge: DOMESTIC ASSAULT Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: SMITH, BRIAN #996, Complaint #: A 132063 2021 Arrest Date: 5/14/2021 Docket #: 1793448 Defendant: APPLEBERRY , BRANDON JAMAL Charge: AGGRAVATED ASSAULT Presiding Judge: WEBB, GERALD Division: 3 Court Room: 3 Arresting Officer: GOULET, JOSEPH #385, Complaint #: A 62533 2021 Arrest Date: 5/26/2021 Docket #: 1852403 Defendant: ATCHLEY , GEORGE FRANKLIN Charge: CRIMINAL TRESPASSING Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: SIMON, LUKE #971, Complaint #: A 100031 2021 Arrest Date: 9/17/2021 Docket #: 1814264 Defendant: AVERY , ROBERT CAMERON Charge: THEFT OF PROPERTY Presiding Judge: WEBB, GERALD Division: 3 Court Room: 3 Arresting Officer: SERRET, ANDREW #845, Complaint #: A 091474 2020 Arrest Date: 9/9/2020 Docket #: 1820785 Defendant: BALDWIN , AUNDREA RENEE Charge: CRIMINAL TRESPASSING Presiding Judge: SELL, CHRISTINE MAHN Division: 1 Court Room: 1 Arresting Officer: FRANTOM, MATTHEW #641, Complaint #: M 115725 2020 Arrest Date: 11/14/2020 Docket #: 1815168 Defendant: BARBER , JUSTIN ASHLEY Charge: OBSTRUCTING HIGHWAY OR OTHER PASSAGEWAY Presiding Judge: STARNES, GARY Division: 5 Court Room: 4 Arresting Officer: LONG, SKYLER #659, Complaint #: A 094778 2020 Arrest Date: 9/18/2020 Docket #: 1812424 Defendant: BARNES
    [Show full text]